23.05.2017 Views

CS1705

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

mobile management<br />

responsiveness, but can also be a major<br />

security headache without strict<br />

management. The network's attack<br />

surface is increased with each new<br />

mobile device, and many organisations<br />

quickly lose track of what devices are<br />

connected and how they are being used".<br />

The BYOD approach, in particular, can<br />

expose companies to a much greater level<br />

of risk, as a mobile that is also used as<br />

personal device will be more likely to be<br />

hit by threats such as mobile malware<br />

and fake or corrupted apps.<br />

A compromised device can then be used<br />

to infect the rest of the corporate<br />

network or access confidential emails and<br />

other data. "Any company with a mobilecentric<br />

workforce should ensure it has a<br />

strict Mobile Device Management (MDM)<br />

strategy to secure emails and corporate<br />

documents, segregate corporate data,<br />

and enforce security policies," states<br />

Noctor. "However, MDM is not always<br />

applicable and can be difficult to<br />

combine with BYOD or apply to<br />

individuals such as contractors and others<br />

who have access to corporate resources,<br />

but are not full employees."<br />

Mobile Application Management (MAM)<br />

is a more flexible and secure approach for<br />

this more diverse workforce, he suggests.<br />

"This approach places security and app<br />

management policies around the<br />

individual business applications, so they<br />

are protected without the need to enrol<br />

the device in MDM. Workers are provided<br />

access to officially sanctioned and<br />

secured mobile apps via a private<br />

enterprise app store. This ensures that<br />

employees are able to easily access the<br />

best apps for the job, while also enabling<br />

the organisation to keep track of what<br />

applications are being used." Managing<br />

mobile apps in this way can also help<br />

enterprises ensure the highest levels of<br />

security even without requiring MDM.<br />

"Powerful app-level policies can be used<br />

to enforce security policies, such as<br />

detecting jailbroken devices and applying<br />

run-time integrity checks, as well as<br />

ensuring that all apps are kept updated,"<br />

he adds.<br />

INADEQUATE PROTECTION<br />

Despite the publicity around mobile<br />

security, research seems to suggest that<br />

many organisations are not adequately<br />

protecting workers and devices when on<br />

the move or in public spaces, comments<br />

Dave Williams, business manager - UK<br />

Electronics Market, 3M. "As well as more<br />

robust software-based measures, another<br />

factor to consider is the 'low tech' one of<br />

prying eyes. Just looking over someone's<br />

shoulder, he cautions, is "one way to<br />

obtain confidential information. Security<br />

breaches are not confined to savyy<br />

hackers".<br />

In the recent Public Spaces Survey<br />

commissioned by 3M and conducted by<br />

the Ponemon Institute, nine out of 10<br />

people questioned had noticed someone<br />

looking at data on their laptops in public,<br />

according to Williams. "Seventy-six per<br />

cent had also inadvertently seen<br />

something on someone's screen that they<br />

should not have done. However, just over<br />

50% confirmed they had not taken any<br />

preventive steps to protect their own<br />

screens from onlookers in public."<br />

VISUAL HACKING<br />

Other research also demonstrates just<br />

how easy it is to carry out a 'visual hack',<br />

whether inside or outside the office," he<br />

continues. "In the Global Visual Hacking<br />

Experiment, also carried out by the<br />

Ponemon Institute on behalf of 3M,<br />

involving a 'white hat' hacker, more than<br />

90% of visual hacking attempts were<br />

successful, with 49% of breaches taking<br />

less than 15 minutes, with an average of<br />

3.9 pieces of sensitive data obtained per<br />

attempt.<br />

"The reality is that, while visual hacking<br />

is fast and easy to achieve, it is also fast<br />

and easy to prevent, using techniques<br />

such as installation of privacy filters,<br />

which stop on-screen information from<br />

being viewed, unless straight-on and<br />

close-up; angling screens, so they cannot<br />

easily be seen; plus educating employees<br />

about their responsibility to prevent<br />

sensitive data being visible to others,<br />

particularly when they are working in<br />

public spaces."<br />

28<br />

computing security May/June 2017 @CSMagAndAwards www.computingsecurity.co.uk

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!